× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e4a3e7c1cd6c46f4a4a0785a67d6b21ad94051971d784c9280f350b27040cebf
File name: ec91d0973ca6739bd31491e09e09ce1f
Detection ratio: 0 / 62
Analysis date: 2018-09-25 00:11:42 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180924
AegisLab 20180924
AhnLab-V3 20180924
Alibaba 20180921
ALYac 20180925
Antiy-AVL 20180925
Arcabit 20180924
Avast 20180925
Avast-Mobile 20180924
AVG 20180925
Avira (no cloud) 20180924
AVware 20180925
Babable 20180918
Baidu 20180914
BitDefender 20180924
Bkav 20180924
CAT-QuickHeal 20180923
ClamAV 20180924
CMC 20180924
Comodo 20180924
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180925
Cyren 20180924
DrWeb 20180924
eGambit 20180925
Emsisoft 20180924
Endgame 20180730
ESET-NOD32 20180925
F-Prot 20180924
F-Secure 20180924
Fortinet 20180924
GData 20180924
Ikarus 20180924
Sophos ML 20180717
Jiangmin 20180924
K7AntiVirus 20180924
K7GW 20180924
Kaspersky 20180925
Kingsoft 20180925
Malwarebytes 20180925
MAX 20180925
McAfee 20180925
McAfee-GW-Edition 20180924
Microsoft 20180925
eScan 20180925
NANO-Antivirus 20180925
Palo Alto Networks (Known Signatures) 20180925
Panda 20180924
Qihoo-360 20180925
Rising 20180925
SentinelOne (Static ML) 20180830
Sophos AV 20180924
SUPERAntiSpyware 20180907
Symantec 20180924
Symantec Mobile Insight 20180924
TACHYON 20180925
Tencent 20180925
TheHacker 20180924
TotalDefense 20180924
TrendMicro 20180924
TrendMicro-HouseCall 20180924
Trustlook 20180925
VBA32 20180924
VIPRE 20180924
ViRobot 20180924
Webroot 20180925
Yandex 20180924
Zillya 20180924
ZoneAlarm by Check Point 20180924
Zoner 20180924
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.supercell.hayday. The internal version number of the application is 1556. The displayed version string of the application is 1_36_212. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.supercell.hayday.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.supercell.hayday.GameApp
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.helpshift.support.activities.ParentActivity
com.helpshift.support.HSReview
com.helpshift.campaigns.activities.ParentActivity
com.helpshift.campaigns.activities.NotificationActivity
Services
com.supercell.hayday.GCMIntentService
org.OpenUDID.OpenUDID_service
com.helpshift.campaigns.services.NotificationService
Receivers
com.supercell.hayday.TimeAlarm
com.google.android.gcm.GCMBroadcastReceiver
com.mobileapptracker.Tracker
Providers
com.facebook.internal.FacebookInitProvider
com.helpshift.support.providers.HelpshiftFileProvider
Service-related intent filters
org.OpenUDID.OpenUDID_service
actions: org.OpenUDID.GETUDID
Activity-related intent filters
com.supercell.hayday.GameApp
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.mobileapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.supercell.hayday
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1490
Uncompressed size
122088464
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
338
csv
235
ogg
213
sc
92
xml
85
ttf
11
mp3
11
so
4
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
347
PNG
338
OGG
213
XML
83
MP3
11
ELF
4
JSON
3
DEX
1
File identification
MD5 ec91d0973ca6739bd31491e09e09ce1f
SHA1 39ed2d66d4d780a504b4926089946806c227663b
SHA256 e4a3e7c1cd6c46f4a4a0785a67d6b21ad94051971d784c9280f350b27040cebf
ssdeep
1572864:Bd1jdZcEGrRLrkdyDxEhS9CVFJ8hvKz5EUgUzXag82PLqOzsa8euVqCE98bLT5SA:BRZ0qdixydPJkKzpWgLqo8edrwLEhvlc

File size 94.3 MB ( 98837304 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf via-tor

VirusTotal metadata
First submission 2017-10-16 11:44:16 UTC ( 1 year, 3 months ago )
Last submission 2018-12-15 07:12:21 UTC ( 1 month ago )
File names com.mod.hay-day-apk-1-36-212-mod.1556.apk
hay-day.apk
887540_40cc8d_com.supercell.hayday-1.36.212.apk
Hay Day_v1_36_212_apkpure.com.apk
Hay Day-1_36_212.apk
hay-day-1-36-212.apk
hay-day-1_36_212.apk
pkg.apk
Hay-Day_1.36.212-Android-1.com.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!